Behavioral task
behavioral1
Sample
444f5e0a4d26922b454bd8b98f5fea5d5395cc8cbd6dbde0df2c6de84b546937.exe
Resource
win7-20240708-en
General
-
Target
444f5e0a4d26922b454bd8b98f5fea5d5395cc8cbd6dbde0df2c6de84b546937
-
Size
405KB
-
MD5
cadd6e7c0b353bf21c159678e67894ce
-
SHA1
d430a4eda67a41883e1b481b72096e25bcf1c7e7
-
SHA256
444f5e0a4d26922b454bd8b98f5fea5d5395cc8cbd6dbde0df2c6de84b546937
-
SHA512
1107c7c11dfe294ea26ea964e491b93ee3baf7842bd2d707d95927d15b037cb7c17309ca4a55bdd37d25a950aa35357fd1b61474d11af226839fef2900850d2b
-
SSDEEP
6144:Jcm4FmowdHoSEubDcAkOCOu0EajNVBZr6y2WXxLO1UqW9E3Hl5:T4wFHoSEubD2P3Hj
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 444f5e0a4d26922b454bd8b98f5fea5d5395cc8cbd6dbde0df2c6de84b546937
Files
-
444f5e0a4d26922b454bd8b98f5fea5d5395cc8cbd6dbde0df2c6de84b546937.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ